Business Processes in a Distributed Surveillance System Integrated Through Workflow

Size: px
Start display at page:

Download "Business Processes in a Distributed Surveillance System Integrated Through Workflow"

Transcription

1 AUTOMATYKA/ AUTOMATICS 2013 Vol. 17 No. 1 Piotr Szwed*, Wojciech Chmiel*, Stanis³aw Jêdrusik*, Piotr Kad³uczka* Business Processes in a Distributed Surveillance System Integrated Through Workflow 1. Introduction SIMPOZ (System of Intelligent Monitoring of Objects and Areas of Special Importance) project aims at building a highly configurable system for surveillance of public areas and objects of a special importance based on the analysis of digital images. Development of dedicated software supporting automation of surveillance tasks is not a trivial issue, due to the fact that events or conditions, which the system should detect may occur in multiple unpredictable variants [9]. The goal of the intelligent monitoring system is to alert an operator about potentially suspicious situations according to assumed safety criteria. An important element of the system is software that exploits recent results of research on image understanding [13]. It is planned to build a unified hardware-software platform that will allow to process and send video signal and to generate, handle and document alarms. Such system requires an efficient integration of components and flexible management of information obtained from supervised areas (originating from various types of detectors: video, audio and thermovision). The approach adopted in the SIMPOZ architecture assumes that integration tasks will be performed by a workflow management system. Its role is to integrate heterogeneous devices (such as cameras, microphones, mobile phones, computers, network and signalling devices) with external systems (databases, existing access control systems) into a homogeneous safety management system. Main premises for using a workflow-type system is a distributed nature and potential diversity of monitoring features, a large number of alarm signals fed by various sensors (external events), the need to ensure a flexible event flow management and tailored to needs emergency response processes. It should be stressed that application of workflow system is a novel approach to security management, not having analogues the existing systems in the world. * AGH University of Science and Technology, Krakow, Poland ** Project sponsored by MNiSW and NCBiR under contract No. 128/R/t00/2010/12 115

2 116 Piotr Szwed, Wojciech Chmiel, Stanis³aw Jêdrusik, Piotr Kad³uczka Workflow processes in SIMPOZ system are defined in the XPDL (XML Process Definition Language) language [4] recommended by the Workflow Management Coalition (WfMC). The XPDL is considered worldwide as a standard in the field of workflow specification. Due to the large number of elements occurring in surveillance systems (both software and hardware), their variety and complicated dependencies. it was found necessary to document system functions, processes and architecture using an easy in perception language supporting direct communication with stakeholders (clients). The language is used for developing abstract specifications, most preferably, allowing an inclusion of salient system aspects already at the business analysis stage. The ArchiMate language [1] seems to be the most suitable for this purpose. ArchiMate allows creating descriptions (views) at the business, application and technological layer levels using a rich set of expressive constructs. The paper presents examples of business models developed with ArchiMate language. They reflect the specificity and characteristics of surveillance systems: reactive character, event driven control, a large number of asynchronous data flows and a frequent requirement of bidirectional communication between detection modules and a system operator. Fig. 1. The operational concept of the system Figure 1 depicts the operational concept of the system and the links between its elements. In the center of the figure a management module is shown; it is responsible for communication and synchronization of all system components and supervision of currently running processes; these functionalities are provided by a workflow management system. Detection modules perform surveillance tasks, i.e. they: detect potentially dangerous objects in the supervised areas, nonstandard (considered as dangerous) behavior and violen-

3 Business Processes in a Distributed Surveillance System Integrated Through Workflow 117 ce of restricted zones. They also extrapolate trajectories (speed and direction) of motion of observed objects, etc. Each of the detection modules have certain degree of freedom in communicating with the surveillance system using specialized interfaces designed in line with SOA (Service Oriented Architecture) approach. Information about an event detection triggers appropriate response procedures (specified in XPDL language) executed by a workflow engine. Operator interface gives access to security related information, which comes from various types of detectors and running processes. In the case, when a suspicious situation is detected or an alarm generated, information about the event is passed to the operator. The operator can also communicate with intervention groups and other parties. In order to better assess the situation, he or she can access current and archive video streams. Interface of signaling devices enable processes managed by workflow system to communicate with these devices and building automation systems (i.e. sirens, displays, emergency exit, illumination, floodgate, HVAC, etc.). Interface of internal communication enables different intervention groups to communicate via various mobile devices. Its main functions are sending confirmation of the call reception, reporting current status of the intervention and communication with an operator and other actors. External communication interfaces allow for sending automatic notification to emergency services (police, army, fire department) relevant to the detected danger. They also provide access to archival materials (video, intervention reports) to external systems. The reporting interface provide access to the database of intervention reports and can be used to generate analytical reports on the basis of the history of events. It also provides entry points for processes that supervise reporting procedures (creation, modification, deletion). The database stores recorded history of performed processes for later review. The adopted model assumes that types of events, time of their occurrence, decisions taken by executors and exchanged messages are recorded. 2. Review of surveillance systems Advanced identification and recognition systems are developed mainly by foreign companies. The Bosch IVA (Intelligent Video Analysis) security system is a leader in this field [5]. Bosch IVA is a comprehensive solution designed for conducting intelligent video surveillance. Basic types of hardware used in the systems are IP cameras as well as VIP X1600 and VideoJet X servers. IVA supports all basic functions of intelligent surveillance. Moreover, it allows to define sophisticated surveillance scenarios. IVA also includes alarm transmission subsystem and centralized management. The software is running on PC class

4 118 Piotr Szwed, Wojciech Chmiel, Stanis³aw Jêdrusik, Piotr Kad³uczka computers. Received alert generates events that highlight a monitor, enlarge the image, automatically display an image preview of selected camera or run an appropriate procedure. Bosch VMS (Video Management System) provides complete surveillance, management of video signals and alarms handling. Alarms coming from IVA system are combined with general motion detection alarms. VMS system allows combining specific alarming conditions and ordering them according to their importance, resulting in possibly complex rules to manage emergency scenarios. An important system feature is, that alarms history is saved in a register, which facilitates finding the desired information in recorded video material. Bosch has developed its own system for searching events in the database called Forensic Search. IndigoVision company [7] provides tools supporting integration and management of alarming systems. Its solutions allow centralized management of distributed monitoring systems through automated handling of alarms detected anywhere in supervised areas. The system allows for defining responsibilities for performing alarm responses and assigning them to registered users. The advantage of this solution is integration of alarms detected by many types of sensors. The system allows an integration of alarm zones (only one alarm is generated in a given area despite detection of events by many sensors), the localization of alarms, automatic forwarding and escalation of alarms, setting up emergency procedures integrated with illumination and automation and creating reports. Another mature solution is VMS (Video Management System) system created by Mirasys Carbon company [10]. It is highly scalable and provides efficient analysis tools that allows an easy and intuitive handling of thousands of videocassette recorders and cameras. The system supports a centralized management of user profiles, constant monitoring of system status and generation of alarms associated with a hardware failure. An important feature of the system is the ability to define the procedures for handling registration and reporting of alarms. The analytical platform is open and can be integrated with any other video analysis software. Moreover, meta-data can be easily searched in databases containing historical data. Integration is based on an open-gateway solution. This allows combining already existing heterogeneous surveillance systems and integration with LDAP service. In turn, Axis Company offers and promotes decentralized systems which perform essential calculations on cameras [3]. A key feature of this approach is free of charge, open standard to support network cameras (Axis network cameras VAPIX). This allows not only to create own applications for intelligent video analysis, but also simplifies the development of a surveillance system, as the standard includes ready-to-use solutions. Camera Application Platform allows to develop client software, which then can be used with network cameras and video encoders from Axis Company. System of Securiton company [11] is equipped with functions of location and georeferenced positioning of objects and 3D technology. The company may deliver specialized

5 Business Processes in a Distributed Surveillance System Integrated Through Workflow 119 modules upon client request. IPS-Outdoor is a high quality video surveillance system for monitoring people and objects in outdoor areas. IPS-Indoor allows to track simultaneously up to 50 objects inside buildings. ISP-Subway, in turn, is dedicated for monitoring subways. It detects graffiti painting and loitering behavior. Apart from delivering locations of objects, it visualizes objects trajectories, also on large maps (geo-reference). This allows to easily track moving objects by different cameras in outdoor areas. The Verint company [14] has developed Nextiva PSIM Actionable Intelligence system that integrates a large number of detectors, introducing mechanisms, which simplify system management, increase the effectiveness of protection and optimize costs. The result of information processing is broadcast to users as well as other modules. The latter automatically identify dangerous situations. The system reduces time to initiate a response, provides tools for response management and effective cooperation with local security forces (police, fire department). Solutions provided by PSIM platform are scalable and are based on an open architecture. They include PSIM scenario generator that allows define scenarios launched in case of such events, as: explosion, flood, aggressive crowd behavior or gas leak. Execution of procedures is controlled through control lists. Visualization of the latter helps the staff to handle them. The system includes also built-in tools to supporting reporting. Other solutions are provided by companies such as Sanyo, GeoVision and Ganz. Presented solutions have a long market history, they are technologically mature, however, they lack from fully process oriented approach. Hence, they do not allow for flexible modification of surveillance procedures without a deep system redesign. Available solutions are rarely based on the SOA paradigm, which recently was recognized as a leading approach in integration of heterogeneous and distributed systems. 3. Workflow systems and XPDL language XPDL (XML Process Definition Language) is an XML based language for definition of workflow processes. Originally, it was designed as a format (standardized by Workflow Management Coalition) to store and exchange definitions of business processes between different modeling tools and/or workflow engines. However, because of its high expressiveness, XPDL is used in practice as a business process execution language. The core element of XPDL language is activity. It represents a working unit that can be realized by a specified resource and/or external application. Activity can be executed automatically or manually. The undoubted advantage of the XPDL language, starting with the first version, is a flexible model of resources assigned to an activity. This allows for both static and dynamic allocation of resources. In addition, each activity can operate on data which are defined within a process or can refer to external resources.

6 120 Piotr Szwed, Wojciech Chmiel, Stanis³aw Jêdrusik, Piotr Kad³uczka The XPDL language distinguishes several types of activities. These are, inter alia: (i) Route activity which models decision, fork, join and synchronize nodes, (ii) Subflow activity which models subprocesses, (iii) Block activity which allows to treat a part of a process as a separate activity without creating a new subprocess, (iv) Event activity which models behaviors related to sending and receiving messages, (v) No Implementation activity which models behaviors not supported by a workflow system and (vi) Task activity which, generally, models collaboration with external applications/systems. The specifications in XPDL language can be expanded by so-called extended attributes that can be assigned to almost any element. An extended attribute is defined as a keyvalue pair. Its semantics can be arbitrarily defined by software developers. In practice, extended attributes are used most often to store values of parameters specific to a given solution. However, they can be used to extend syntax and semantics of XPDL language without changing the language specification. 4. ArchiMate language ArchiMate [1, 2] is a contemporary, open and independent language of enterprise architecture description. It includes three modeling layers: business, application and technology. The advantage of the ArchiMate is that it gives a comprehensive overview of the whole enterprise architecture. The business layer includes business processes and objects processed by them, functions, events, roles and services. The application layer includes components, interfaces, application services and data objects. Finally, the technology layer contains such elements as artifacts, nodes, software, devices, communication channels and networks. ArchiMate allows to present an architecture in the form of views which, depending on the needs, can include only items in one layer or can show vertical relations between layers (e.g.: the relationship between business activity and function of the component software). ArchiMate language was built in opposition to UML [6], which can be seen as a collection of unrelated diagrams, and BPMN [4] which covers mainly behavioral aspect of enterprise architecture. The definition of a language has been accompanied by the assumption, that in order to build an expressive business model, it is necessary to use the relationships between completely different areas, starting from business motivation to business processes, services and infrastructure. ArchiMate goes beyond UML [8]: it defines a metamodel on the basis of which a user can create and illustrate the relationships between elements of different layers. The subsequent sections present the views of the ArchiMate model limited to business layer. However, the decision of using this language in the project also includes documentation of lower layers: application and technology.

7 Business Processes in a Distributed Surveillance System Integrated Through Workflow SIMPOZ system functions The modeling approach applied here considers a function as a collection of processes. These processes can be flexibly combined through the events mechanism (e.g., after an operator approves an alarm, alarm identification process generates an event that initiates a response process; a response process triggers next event which is responsible for communication with external police services, etc.). The above mechanism of dynamic composition of processes is used for translation of descriptions of business processes to executable XPDL language. Fig. 2. SIMPOZ platform functions Figure 2 presents the general overview of system functions. They include: Alarm identification: processes of events detection and classification, aiming at assessing that an alarm is founded or rejecting it. Response: processes in this group aim to coordinate the response to events. Reporting: notification of all alarms, creating reports and statistical summaries for subscribed parties. Informing passengers: broadcasting information about items left, managing evacuations and opening restricted areas to public use. Cooperation with external services: covers processes directing requests to police, medical services, fire department and processes providing access to digital evidence materials (video recordings). Processes in functions are divided into three groups: core processes controlled by a workflow management system, management processes carried out using dedicated software and support processes or services.

8 122 Piotr Szwed, Wojciech Chmiel, Stanis³aw Jêdrusik, Piotr Kad³uczka The examples of processes in the Response function, divided into three groups, are summarized in Table 1. Table 1 Groups of processes in the function Response Core processes Management processes Supporting processes R1. Takeover of an object violating a restricted zone R2. Response to identified bomb threat (detection of a suspicious stationary object in restricted area) R3. Response to dangerous behavior of a single person R4. Response to untypical/dangerous behavior of a group R5. Response to detection of moving object with colliding trajectory R6. Guarding tour RM1. Intervention group management (defining groups and their members) RM2. Defining schedules of tasks for groups RM3. Defining schedules of operators work (shifts) RM4. Defining schedules of guarding tours RS1. Storing reports and history of intervention in a repository RS1. Storing text and/or voice messages sent during intervention RS1. Storing recordings of operator s calls 6. Event-oriented model of the process This section presents one of the processes in the Response function: Takeover of an objects violating a restricted zone. It was chosen as an example, because its flow includes communication patterns and shows more complex courses of interaction between two roles: Operator and Intervention group(s). Specification of business processes within SIMPOZ project is prepared in two equivalent forms: narrative and graphical. Textual descriptions are made based on a template usually recommended for use cases. The template specifies goals, performers, a triggering event and pre- and post-conditions. In the case of the presented process, the goal is to coordinate the response to the event in order to take over the object violating a zone. The process is triggered by an emergence of the event Alarm zone violation generated in Alarm identification function. The postconditions are defined as successful object takeover ( failed object takeover ) and require, that intervention history records are present in a repository. The model of the Takeover of an object violating a restricted zone process is in fact a collection of subprocesses whose names (see Fig. 3) correspond to numbering in the scenario. The figures present only a partial specification. The considered process consists of nine subprocesses. Each of them starts and ends with an event. For example, the main

9 Business Processes in a Distributed Surveillance System Integrated Through Workflow 123 subprocess in Figure 3 starts after reception of external triggering event (Alarm zone violation) and ends with one of the events: R1 Terminate (internal event) or To the police take the detainee (event passed to another function). Fig. 3. Main flow of intervention process In the adopted model (and the executive system), the Terminate event has a special semantics. It terminates all instances of the process and its child subprocesses and removes unhandled event from the system queues. The internal event STOP shown in Figure 4 terminates only a given subprocess. The event R1 Request for support can be generated and received during an occurrence of the activity Localize and takeover the object, what is depicted in Figure 4 by the appropriate association. As a result of its handling (Fig. 4), the request can be rejected, which ends the child process, the event requesting support can be generated or the main process can be recursively called through the generation of the event Alarm zone violation. Figure 5 shows the process of handling of the internal event No contact with the group. The R1 waiting time T1 elapsed event is a typical construction for expressing time requirements. If the deadline is not met, the main process is called recursively. The last of the sub-processes, shown in Figure 6, describes reactions to events that informs of movements of object and the intervention group, coming from tracking process in Alarm identification function (the presence of the intervention group in the supervised sectors changes the mode of operation of functions monitoring zone violation).

10 124 Piotr Szwed, Wojciech Chmiel, Stanis³aw Jêdrusik, Piotr Kad³uczka Fig. 4. Recursive call of the main process by sending the event Alarm area violation Fig. 5. Timeout detection (events generated as a result of not meeting deadline) Fig. 6. Process controlling the changes of surveillance modes in the sectors in which an intervention group is displacing The remaining subprocesses include among others: handling of operator s decision (completion of the intervention, assignment of a support, calling external services) and re-

11 Business Processes in a Distributed Surveillance System Integrated Through Workflow 125 gistration of the course of the intervention. Several subprocesses are defined in order to react to special events such as disappearance of the object in the supervised area or remaining of the object in a restricted zone without possibility of taking it over (the process terminates when intervention is taken by police services). It is worth noting, that all the events and decisions in the implemented system are registered. Registration of the decision is defined at the process specification level and registration (auditing) of events is a built-in function of the executive platform. The presented examples demonstrate the complexity of the surveillance systems processes. On one hand, these processes presented in a decomposed form inspired by patterns from EPC [12] language seem relatively simple. On the other hand, it should be remarked that only selected subprocesses of a larger single process are presented. Their instances can be dynamically created by events generation, hence an integrated process resulting from their composition can be perceived as a very complex. The ArchiMate language, in contrary to, e.g., BPMN, has no defined semantic. In spite of the smaller set of dedicated behavioral constructs, after adopting a certain convention, it can be used to express similar aspects of system behavior. Events STOP, Terminate or time events correspond in fact to BPMN events. Gathered experience indicates, that properly used constructs of the ArchiMate language allow obtaining high level of expressiveness. At the same time, the undoubted advantage of the language is the ability to combine elements of different architecture layers, business, application, and technical support, in one coherent model. This allows keeping consistency between the business and the application models and documenting implementation at the level of the technical infrastructure. 7. Conclusions The main purpose of this paper is to present principles of modeling of business processes in distributed surveillance systems that were applied in the case of SIMPOZ system. The developed distributed surveillance platform is integrated through a workflow system which is an innovative element with respect to other solutions found on the market. The experience acquired during the project realization justify the finding that the business modeling phase is essential for this class of systems and may strongly influence quality of project outcomes. It is important, however, to appropriately select tools, which in further stages will be used to describe various aspects of the analyzed system. Constructs offered by the ArchiMate language are sufficiently expressive to describe event orientation in workflow processes, assignment of performers to operations, manipulation of data, distinguishing types of components, documenting interfaces and system devices. These features proved particularly useful to define interfaces of modules and encoding processes using XPDL language. The experience acquired from business analysis of SIMPOZ system may, in a long term perspective, result in development of tools supporting automatic translation of Archimate diagrams to XPDL language.

12 126 Piotr Szwed, Wojciech Chmiel, Stanis³aw Jêdrusik, Piotr Kad³uczka References [1] Archimate 1.0 Specification, The Open Group, , pp [2] Archi, Archimate Modelling Tool, [3] Axis (2012), Axis Comm. AB: [4] Business Process Modeling Notation Specification. Version 1.2, January 2009, OMG Document [5] Bosch (2012) Intelligent Video Analysis (IVA) [6] Fowler M., UML Distilled. 3rd ed. Addison-Wesley [7] IndygoVision, [8] Malik N. (2009), Will there be a battle between Archimate and the UML?, b/nickmalik/archive/2009/04/17/will-there-be-a-battle-between-archimate-and-theuml.aspx. [9] Mikrut Z., Tadeusiewicz R., Sieci neuronowe w przetwarzaniu i rozpoznawaniu obrazów. [in:] Biocybernetyka i In ynieria Biomedyczna 2000, t. 6, Sieci Neuronowe, AOW EXIT, Warszawa 2000, pp [10] Mirasys Carbon VMS: [11] Securiton AG, [12] Scheer A.-W., ARIS Business Process Modeling, Springer, [13] Tadeusiewicz R., Ogiela M., Szczepaniak P., Notes on a Linguistic Description as the Basis for Automatic Image Understanding. Applied Mathematics and Computer Science 19(1), 2009, pp [14] Verint Systems Inc.,

White paper. Axis Video Analytics. Enhancing video surveillance efficiency

White paper. Axis Video Analytics. Enhancing video surveillance efficiency White paper Axis Video Analytics Enhancing video surveillance efficiency Table of contents 1. What is video analytics? 3 2. Why use video analytics? 3 2.1 Efficient use of manpower 3 2.2 Reduced network

More information

White paper. Axis Video Analytics. Enhancing video surveillance efficiency

White paper. Axis Video Analytics. Enhancing video surveillance efficiency White paper Axis Video Analytics Enhancing video surveillance efficiency Table of contents 1. What is video analytics? 3 2. Why use video analytics? 3 2.1 Efficient use of manpower 3 2.2 Reduced network

More information

MM8000 safety and security with smart danger management. A scalable and flexible management station for any requirement. Answers for infrastructure.

MM8000 safety and security with smart danger management. A scalable and flexible management station for any requirement. Answers for infrastructure. MM8000 safety and security with smart danger management A scalable and flexible management station for any requirement Answers for infrastructure. Sophisticated technology for comprehensive safety Safety

More information

Business Process Modeling and Standardization

Business Process Modeling and Standardization Business Modeling and Standardization Antoine Lonjon Chief Architect MEGA Content Introduction Business : One Word, Multiple Arenas of Application Criteria for a Business Modeling Standard State of the

More information

Product Characteristics Page 2. Management & Administration Page 2. Real-Time Detections & Alerts Page 4. Video Search Page 6

Product Characteristics Page 2. Management & Administration Page 2. Real-Time Detections & Alerts Page 4. Video Search Page 6 Data Sheet savvi Version 5.3 savvi TM is a unified video analytics software solution that offers a wide variety of analytics functionalities through a single, easy to use platform that integrates with

More information

Building Integration System Selection Guide for V4.0

Building Integration System Selection Guide for V4.0 Building Integration System Selection Guide for V.0 Building Integration System Contents Contents System overview... Typical applications... Connection types and licensing basics... 6 Selection Guide

More information

Merchandising Security Customer Satisfaction. Business Intelligence for the. Retail Sector. V i d e o A n a l y t i c s

Merchandising Security Customer Satisfaction. Business Intelligence for the. Retail Sector. V i d e o A n a l y t i c s Merchandising Security Customer Satisfaction Business Intelligence for the V i d e o A n a l y t i c s Retail Sector VCA Technology video analytics is capable of multi-tasking. Depending on the field of

More information

Integrated Physical Security and Incident Management

Integrated Physical Security and Incident Management IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting

More information

INTELLECT TM Software Package

INTELLECT TM Software Package AxxonSoft INTELLECT TM Software Package Quick Start Guide Version 1.0.0 Moscow 2010 1 Contents CONTENTS... 2 1 INTRODUCTION... 3 1.1 Document purpose... 3 1.2 Purpose of the Intellect software package...

More information

Building Integration System Your platform for customized security and safety management

Building Integration System Your platform for customized security and safety management A Tradition of Quality and Innovation For 12 years, the Bosch name stands for quality and reliability. Bosch is the global supplier of choice for innovative technology, backed by the highest standards

More information

SOA Enabled Workflow Modernization

SOA Enabled Workflow Modernization Abstract Vitaly Khusidman Workflow Modernization is a case of Architecture Driven Modernization (ADM) and follows ADM Horseshoe Lifecycle. This paper explains how workflow modernization fits into the ADM

More information

IP Video Surveillance

IP Video Surveillance IP Video Surveillance Solutions and Services Wireless IP PDA Administration Wireless Access Point Viewer Remote Control IP Video Server IP Network Alarm Management Video Recording Analog Video Server Access

More information

VisioWave TM. Intelligent Video Platform (IVP) Smart Scalable Open. Optimized for high-performance, mission-critical digital video surveillance

VisioWave TM. Intelligent Video Platform (IVP) Smart Scalable Open. Optimized for high-performance, mission-critical digital video surveillance GE Security VisioWave TM Intelligent Video Platform (IVP) Optimized for high-performance, mission-critical digital video surveillance Smart Scalable Open Take a good look at VisioWave TM IVP You ll watch

More information

The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security

The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution

More information

Advanced Network Video And Alarm Management Suite

Advanced Network Video And Alarm Management Suite Advanced Network Video And Alarm Management Suite ViMS. Advanced Network Video & Alarm Management Suite G anz ViMS Command is a powerful IP network based, open standards Video & Alarm Management software

More information

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform Next Generation Surveillance Solutions Cware The Advanced Video Management & NVR Platform Advanced Open Management Benefit from the most effective CCTV management platform Cware is an advanced video management

More information

THE SIMULATION OF SOFTWARE PROCESSES IN THE INTEGRATED COMPUTER ENVIRONMENT IN THE CASE OF TELCO SECTOR

THE SIMULATION OF SOFTWARE PROCESSES IN THE INTEGRATED COMPUTER ENVIRONMENT IN THE CASE OF TELCO SECTOR THE SIMULATION OF SOFTWARE PROCESSES IN THE INTEGRATED COMPUTER ENVIRONMENT IN THE CASE OF TELCO SECTOR Jerzy Roszkowski, Andrzej Kobylinski 2 Management Systems Consulting, Poznanska 28/, 93-34 Lodz,

More information

Business Process Management with @enterprise

Business Process Management with @enterprise Business Process Management with @enterprise March 2014 Groiss Informatics GmbH 1 Introduction Process orientation enables modern organizations to focus on the valueadding core processes and increase

More information

RFID System Description for Logistics & Inventory

RFID System Description for Logistics & Inventory RFID System Description for Logistics & Inventory 1. General The Vizbee platform is a flexible rule based solution for RFID based applications that can adapt to the customer s needs and evolve with them.

More information

Axis network cameras A wide portfolio of products for professional video surveillance.

Axis network cameras A wide portfolio of products for professional video surveillance. Axis network cameras A wide portfolio of products for professional video surveillance. The market s widest range of network cameras The video surveillance market is thriving, driven by increased public

More information

A Study on Integrated Security Service Control Solution Development about CRETA Security

A Study on Integrated Security Service Control Solution Development about CRETA Security A Study on Integrated Security Service Control Solution Development about CRETA Security Yongwon (Conrad) Cho 1, Jinwon (Frank) Choi 2 1 Director Research Engineer, Virtual Builders Co., Ltd. 2 CEO & Co-Founder,

More information

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become

More information

Asset Tracking System

Asset Tracking System Asset Tracking System System Description Asset & Person Tracking 1. General The Vizbee platform is a flexible rule based solution for RFID based applications that can adapt to the customer s needs and

More information

RIVA Megapixel cameras with integrated 3D Video Analytics - The next generation

RIVA Megapixel cameras with integrated 3D Video Analytics - The next generation RIVA Megapixel cameras with integrated 3D Video Analytics - The next generation Creating intelligent solutions with Video Analytics (VCA- Video Content Analysis) Intelligent IP video surveillance is one

More information

Building Integration System Your platform for customized security and safety management

Building Integration System Your platform for customized security and safety management Building Integration System Your platform for customized security and safety management 2 One platform for everything Efficient building management is becoming not only more important, but also a more

More information

EMEREC. Information management for emergency crews.

EMEREC. Information management for emergency crews. EMEREC Information management for emergency crews. Rosenbauer EMEREC New screen New screen IT solutions from Rosenbauer For more than 140 years, the Rosenbauer name has been synonymous with ground-breaking

More information

USAGE OF BUSINESS RULES IN SUPPLY CHAIN MANAGEMENT

USAGE OF BUSINESS RULES IN SUPPLY CHAIN MANAGEMENT TOTAL LOGISTIC MANAGEMENT No. 2 2009 PP. 5 13 Bartłomiej GAWEŁ, Anna PILCH USAGE OF BUSINESS RULES IN SUPPLY CHAIN MANAGEMENT Abstract: The growth of efficiency in supply chain management depends on the

More information

Efficient BPMN: from Anti-Patterns to Best Practices

Efficient BPMN: from Anti-Patterns to Best Practices Efficient BPMN: from Anti-Patterns to Best Practices Architecture Made Simple Kristina Bigelienė, No Magic Europe About Speaker Kristina Bigelienė kristina.bigeliene@nomagic.com Solution Architect for

More information

AxxonSoft Inc. Axxon Smart. Quick Start Guide. AxxonSoft. The. Axxon Smart. Software Package. Quick Start Guide. Version 1.0

AxxonSoft Inc. Axxon Smart. Quick Start Guide. AxxonSoft. The. Axxon Smart. Software Package. Quick Start Guide. Version 1.0 AxxonSoft The Axxon Smart Software Package Quick Start Guide Version 1.0 Moscow 2010 1 Contents CONTENTS... 2 1 INTRODUCTION... 3 1.1 Document purpose... 3 1.2 Purpose of the Axxon Smart software package...

More information

Deploying VSaaS and Hosted Solutions Using CompleteView

Deploying VSaaS and Hosted Solutions Using CompleteView SALIENT SYSTEMS WHITE PAPER Deploying VSaaS and Hosted Solutions Using CompleteView Understanding the benefits of CompleteView for hosted solutions and successful deployment architecture Salient Systems

More information

Methods for Lawful Interception in IP Telephony Networks Based on H.323

Methods for Lawful Interception in IP Telephony Networks Based on H.323 Methods for Lawful Interception in IP Telephony Networks Based on H.323 Andro Milanović, Siniša Srbljić, Ivo Ražnjević*, Darryl Sladden*, Ivan Matošević, and Daniel Skrobo School of Electrical Engineering

More information

Guarded community solutions Easy Series for villa and apartment projects

Guarded community solutions Easy Series for villa and apartment projects Guarded community solutions Easy Series for villa and apartment projects 2 Easy Series Control Panel Making security easy and reliable Add value to your innovative real-estate projects Ambitious apartment

More information

Using UML Part Two Behavioral Modeling Diagrams

Using UML Part Two Behavioral Modeling Diagrams UML Tutorials Using UML Part Two Behavioral Modeling Diagrams by Sparx Systems All material Sparx Systems 2007 Sparx Systems 2007 Page 1 Trademarks Object Management Group, OMG, Unified Modeling Language,

More information

A process model is a description of a process. Process models are often associated with business processes.

A process model is a description of a process. Process models are often associated with business processes. Process modeling A process model is a description of a process. Process models are often associated with business processes. A business process is a collection of related, structured activities that produce

More information

Our focus is innovating security where you need it most

Our focus is innovating security where you need it most Our focus is innovating security where you need it most Cameras which trigger alarms and alert you when needed 2 Cameras which trigger alarms and alert you when needed Cameras which trigger alarms and

More information

PIE. Internal Structure

PIE. Internal Structure PIE Internal Structure PIE Composition PIE (Processware Integration Environment) is a set of programs for integration of heterogeneous applications. The final set depends on the purposes of a solution

More information

The Concept of Automated Process Control

The Concept of Automated Process Control Scientific Papers, University of Latvia, 2010. Vol. 756 Computer Science and Information Technologies 193 203 P. The Concept of Automated Process Control Ivo Oditis 1, Janis Bicevskis 2 1 Bank of Latvia,

More information

GRAPHICAL USER INTERFACE, ACCESS, SEARCH AND REPORTING

GRAPHICAL USER INTERFACE, ACCESS, SEARCH AND REPORTING MEDIA MONITORING AND ANALYSIS GRAPHICAL USER INTERFACE, ACCESS, SEARCH AND REPORTING Searchers Reporting Delivery (Player Selection) DATA PROCESSING AND CONTENT REPOSITORY ADMINISTRATION AND MANAGEMENT

More information

IRA 423/08. Designing the SRT control software: Notes to the UML schemes. Andrea Orlati 1 Simona Righini 2

IRA 423/08. Designing the SRT control software: Notes to the UML schemes. Andrea Orlati 1 Simona Righini 2 Designing the SRT control software: Notes to the UML schemes Andrea Orlati 1 Simona Righini 2 1 - I.N.A.F. Istituto di Radioastronomia. 2 Dip. Astronomia - Università degli Studi di Bologna. Dicembre 2008

More information

Innovative approach to security solutions

Innovative approach to security solutions > > > > > Innovative approach to security solutions www.tehnomobil.eu/solutions This is why we in Tehnomobil believe that security starts long before the first smoke detector, card reader or camera is

More information

Physical Security Information Management

Physical Security Information Management Physical Security Information Management Timely and Efficient Situation Management Using Data Fusion, Rules and Workflows, and Simulation with 3-D Modeling July 2011 Table of Contents Executive Summary...

More information

D-Link, the D-Link logo, and D-ViewCam are trademarks or registered trademarks of D-Link Corporation or its subsidiaries in the United States and

D-Link, the D-Link logo, and D-ViewCam are trademarks or registered trademarks of D-Link Corporation or its subsidiaries in the United States and Remotely Managed Internet Cameras Deliver Low-Cost IP Surveillance Monitoring and Automation White Paper Abstract Internet Protocol cameras (IP cameras) enable anyone with access credentials and a standard

More information

Intelligent Monitoring Software. IMZ-RS400 Series IMZ-RS401 IMZ-RS404 IMZ-RS409 IMZ-RS416 IMZ-RS432

Intelligent Monitoring Software. IMZ-RS400 Series IMZ-RS401 IMZ-RS404 IMZ-RS409 IMZ-RS416 IMZ-RS432 Intelligent Monitoring Software IMZ-RS400 Series IMZ-RS401 IMZ-RS404 IMZ-RS409 IMZ-RS416 IMZ-RS432 IMZ-RS400 Series Reality High Frame Rate Audio Support Intelligence Usability Video Motion Filter Alarm

More information

Honeywell Video Analytics

Honeywell Video Analytics INTELLIGENT VIDEO ANALYTICS Honeywell s suite of video analytics products enables enhanced security and surveillance solutions by automatically monitoring video for specific people, vehicles, objects and

More information

Autonomy Consolidated Archive

Autonomy Consolidated Archive Autonomy Consolidated Archive Dennis Wild Director SME, Information Governance and Archiving POWER PROTECT PROMOTE Meaning-Based Governance Files IM Audio Email Social Video SharePoint Archiving = Gain

More information

7. Classification. Business value. Structuring (repetition) Automation. Classification (after Leymann/Roller) Automation.

7. Classification. Business value. Structuring (repetition) Automation. Classification (after Leymann/Roller) Automation. 7. Classification Business Process Modelling and Workflow Management Business value Lecture 4 (Terminology cntd.) Ekkart Kindler kindler@upb.de Structuring (repetition) Automation UPB SS 2006 L04 2 Classification

More information

Process Modeling using BPMN 2.0

Process Modeling using BPMN 2.0 Process Modeling using BPMN 2.0 This chapter provides a brief overview of Business Process Modeling Notation (BPMN) concepts with particular emphasis on the BPMN 2.0 additions. In addition, it describes

More information

Introducing your Intelligent Monitoring Software. Designed for security.

Introducing your Intelligent Monitoring Software. Designed for security. Introducing your Intelligent Monitoring Software. Designed for security. RealShot Manager Advance www.sonybiz.net/videosecurity Simple, flexible and scalable HD-ready Intelligent Monitoring Software from

More information

Scalability is the best solution. The new Social Alarm Management System 7 Professional.

Scalability is the best solution. The new Social Alarm Management System 7 Professional. Scalability is the best solution. The new Social Alarm Management System 7 Professional. 2 Efficiency through customising Ideal solutions for your success To ensure immediate responses to emergency calls,

More information

Complete IP Video Security Solutions

Complete IP Video Security Solutions Complete IP Video Security Solutions www.indigovision.com About Us First security project World s first NVR The IndigoVision Network Video Recorder (NVR) is introduced to the Security Market. World s first

More information

Enterprise Storage Manager. Managing Video As A Strategic Asset November 2009

Enterprise Storage Manager. Managing Video As A Strategic Asset November 2009 Enterprise Storage Manager Managing Video As A Strategic Asset November 2009 Table of Contents About Verint Video Intelligence Solutions... 1 About Verint Systems... 1 Preface: The Significance of Video

More information

PRICE LIST (EUR) July 2015

PRICE LIST (EUR) July 2015 PRICE LIST (EUR) July 2015 20.07.2015 1. Terms and Conditions Validity This price list is valid from July 20 th 2015 on and it will be replaced by any newer SeeTec price list. The price list applies to

More information

Our mission is to develop and to offer innovative customer interaction.

Our mission is to develop and to offer innovative customer interaction. www.nixxis.com Copyright 2011 Nixxis Group All rights reserved. Reproduction of this publication in any form without prior written permission is forbidden. Approach Today s business world is facing two

More information

PRODUCT Synergy Security Management System

PRODUCT Synergy Security Management System Synergy Security Management System Video Integration, Command & Control Solution Synergy Security Management System Command and Control Synergy Security Management System SYNERGY FEATURES Comprehensive

More information

Axis IP surveillance. Endless possibilities for video surveillance.

Axis IP surveillance. Endless possibilities for video surveillance. Axis IP surveillance. Endless possibilities for video surveillance. The video surveillance market is growing constantly, driven by increased public and private security concerns, as well as a technology

More information

SERENITY Pattern-based Software Development Life-Cycle

SERENITY Pattern-based Software Development Life-Cycle SERENITY Pattern-based Software Development Life-Cycle Francisco Sanchez-Cid, Antonio Maña Computer Science Department University of Malaga. Spain {cid, amg}@lcc.uma.es Abstract Most of current methodologies

More information

REQUEST FOR PROPOSAL Website Design and Development. DUE DATE: FEBRUARY 19, 2016-12:00 p.m.

REQUEST FOR PROPOSAL Website Design and Development. DUE DATE: FEBRUARY 19, 2016-12:00 p.m. REQUEST FOR PROPOSAL Website Design and Development DUE DATE: FEBRUARY 19, 2016-12:00 p.m. City of Willow Park 516 Ranch House Rd. Willow Park, Texas 76087 (817) 441 7108 www.willowpark.org Inquiries Inquiries

More information

Milestone Integration Platform Software Development Kit 2 (MIP SDK 2)

Milestone Integration Platform Software Development Kit 2 (MIP SDK 2) Milestone Integration Platform Software Development Kit 2 (MIP SDK 2) Agenda Introduction to MIP and MIP SDK What s new in MIP SDK 2 Summary Q&A Typical security infrastructure Point-of-sale (POS) Access

More information

STATE-OF-THE-ART FLAME, SMOKE AND INTRUSION VIDEO DETECTION TECHNOLOGY FIRE DETECTION AND VIDEO SURVEILLANCE

STATE-OF-THE-ART FLAME, SMOKE AND INTRUSION VIDEO DETECTION TECHNOLOGY FIRE DETECTION AND VIDEO SURVEILLANCE STATE-OF-THE-ART FLAME, SMOKE AND INTRUSION VIDEO DETECTION TECHNOLOGY FIRE DETECTION AND VIDEO SURVEILLANCE STATE-OF-THE-ART FIRE DETECTION AND VIDEO SURVEILLANCE Due to the inherent nature of their design,

More information

W H I T E P A P E R. Security & Defense Solutions Intelligent Convergence with EdgeFrontier

W H I T E P A P E R. Security & Defense Solutions Intelligent Convergence with EdgeFrontier W H I T E P A P E R Security & Defense Solutions Intelligent Convergence with EdgeFrontier Contents 1. Introduction... 2 2. The Need for Intelligent Convergence... 3 2.1 Security Convergence with EdgeFrontier...

More information

A business view for NGN service usage

A business view for NGN service usage A business view for NGN service usage Emmanuel Bertin 1, Idir Fodil 1, Noel Crespi 2 1 France Telecom, R&D division 2 Institut National des Télécommunications (GET-INT) Abstract. Next Generation Networks

More information

Redefining Security for the Modern Facility

Redefining Security for the Modern Facility Redefining Security for the Modern Facility TM Make the most of your energy 02 Protecting your people, property and data 03 Trust your facilities to a leader in security systems The world is changing rapidly.

More information

OMG releases BPMN 1.1 - What's changed?

OMG releases BPMN 1.1 - What's changed? OMG releases BPMN 1.1 - What's changed? (revised version as of April 2008) Gero Decker 1 and Torben Schreiter 2 1 Hasso Plattner Institute, Potsdam, Germany 2 inubit AG, Berlin, Germany Abstract The Business

More information

ALCATEL-LUCENT ENTERPRISE OPENTOUCH NOTIFICATION SERVICE IMPROVE REAL-TIME SITUATIONAL AWARENESS

ALCATEL-LUCENT ENTERPRISE OPENTOUCH NOTIFICATION SERVICE IMPROVE REAL-TIME SITUATIONAL AWARENESS ALCATEL-LUCENT ENTERPRISE OPENTOUCH NOTIFICATION SERVICE IMPROVE REAL-TIME SITUATIONAL AWARENESS In healthcare, education, high-risk industries and the hospitality sector, you must know immediately if

More information

secure intelligence collection and assessment system Your business technologists. Powering progress

secure intelligence collection and assessment system Your business technologists. Powering progress secure intelligence collection and assessment system Your business technologists. Powering progress The decisive advantage for intelligence services The rising mass of data items from multiple sources

More information

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients A Detailed Review EMC Information Infrastructure Solutions Abstract This white

More information

SERVICE ORIENTED ARCHITECTURE

SERVICE ORIENTED ARCHITECTURE SERVICE ORIENTED ARCHITECTURE Introduction SOA provides an enterprise architecture that supports building connected enterprise applications to provide solutions to business problems. SOA facilitates the

More information

UPROM Tool: A Unified Business Process Modeling Tool for Generating Software Life Cycle Artifacts

UPROM Tool: A Unified Business Process Modeling Tool for Generating Software Life Cycle Artifacts UPROM Tool: A Unified Business Process Modeling Tool for Generating Software Life Cycle Artifacts Banu Aysolmaz 1 and Onur Demirörs 2 1, 2 Informatics Institute, Middle East Technical University, Ankara,

More information

IFS-8000 V2.0 INFORMATION FUSION SYSTEM

IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 Overview IFS-8000 v2.0 is a flexible, scalable and modular IT system to support the processes of aggregation of information from intercepts to intelligence

More information

A Survey Study on Monitoring Service for Grid

A Survey Study on Monitoring Service for Grid A Survey Study on Monitoring Service for Grid Erkang You erkyou@indiana.edu ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide

More information

Process Modeling Notations and Workflow Patterns

Process Modeling Notations and Workflow Patterns Process Modeling Notations and Workflow Patterns Stephen A. White, IBM Corp., United States ABSTRACT The research work of Wil van der Aalst, Arthur ter Hofstede, Bartek Kiepuszewski, and Alistair Barros

More information

TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility

TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility Trust your facilities to a leader in security systems The world is changing rapidly. Companies and government agencies

More information

Architectural view model for an integration platform

Architectural view model for an integration platform Journal of Theoretical and Applied Computer Science Vol. 6, No. 1, 2012, pp. 25-34 ISSN 2299-2634 http://www.jtacs.org Architectural view model for an integration platform Tomasz Górski Military University

More information

Monitoring BPMN-Processes with Rules in a Distributed Environment

Monitoring BPMN-Processes with Rules in a Distributed Environment Monitoring BPMN-Processes with Rules in a Distributed Environment Lothar Hotz 1, Stephanie von Riegen 1, Lars Braubach 2, Alexander Pokahr 2, and Torsten Schwinghammer 3 1 HITeC e.v. c/o Fachbereich Informatik,

More information

Challenges and Opportunities for formal specifications in Service Oriented Architectures

Challenges and Opportunities for formal specifications in Service Oriented Architectures ACSD ATPN Xi an China June 2008 Challenges and Opportunities for formal specifications in Service Oriented Architectures Gustavo Alonso Systems Group Department of Computer Science Swiss Federal Institute

More information

Motorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost

Motorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost Motorola AirDefense Network Assurance Solution Improve WLAN reliability and reduce management cost The challenge: Ensuring wireless network performance and availability Wireless LANs help organizations

More information

Change Pattern-Driven Traceability of Business Processes

Change Pattern-Driven Traceability of Business Processes Proceedings of the International MultiConference of Engineers and Computer Scientists 2014 Vol I,, March 12-14, 2014, Hong Kong Change Pattern-Driven Traceability of Business Processes Watcharin Uronkarn

More information

Evaluating OO-CASE tools: OO research meets practice

Evaluating OO-CASE tools: OO research meets practice Evaluating OO-CASE tools: OO research meets practice Danny Greefhorst, Matthijs Maat, Rob Maijers {greefhorst, maat, maijers}@serc.nl Software Engineering Research Centre - SERC PO Box 424 3500 AK Utrecht

More information

RS MDM. Integration Guide. Riversand

RS MDM. Integration Guide. Riversand RS MDM 2009 Integration Guide This document provides the details about RS MDMCenter integration module and provides details about the overall architecture and principles of integration with the system.

More information

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System To provide more flexibility and scalability for comprehensive security systems, more components are becoming IP enabled.

More information

Business Process Modeling Information Systems in Industry (372-1-4207 )

Business Process Modeling Information Systems in Industry (372-1-4207 ) Business Process Modeling Information Systems in Industry (372-1-4207 ) Arnon Sturm The material of this presentation is adopted from various people including:, Pnina Soffer, Iris Reinhartz-Berger 1 Outline

More information

Layered Approach to Development of OO War Game Models Using DEVS Framework

Layered Approach to Development of OO War Game Models Using DEVS Framework Layered Approach to Development of OO War Game Models Using DEVS Framework Chang Ho Sung*, Su-Youn Hong**, and Tag Gon Kim*** Department of EECS KAIST 373-1 Kusong-dong, Yusong-gu Taejeon, Korea 305-701

More information

Mirasys Carbon VCA. Michael Schuh

Mirasys Carbon VCA. Michael Schuh Mirasys Carbon VCA Michael Schuh 1 Role of Carbon VCA Control center Web client Carbon master Reporting Video-wall Internet Spotter Mobile workstation E.g. access control integr. gateway...... V-series

More information

Masters in Information Technology

Masters in Information Technology Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101

More information

From Business World to Software World: Deriving Class Diagrams from Business Process Models

From Business World to Software World: Deriving Class Diagrams from Business Process Models From Business World to Software World: Deriving Class Diagrams from Business Process Models WARARAT RUNGWORAWUT 1 AND TWITTIE SENIVONGSE 2 Department of Computer Engineering, Chulalongkorn University 254

More information

1.. This UI allows the performance of the business process, for instance, on an ecommerce system buy a book.

1.. This UI allows the performance of the business process, for instance, on an ecommerce system buy a book. * ** Today s organization increasingly prompted to integrate their business processes and to automate the largest portion possible of them. A common term used to reflect the automation of these processes

More information

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE PRODUCT BRIEF LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE The Tripwire VIA platform delivers system state intelligence, a continuous approach to security that provides leading indicators of breach

More information

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE PRODUCT BRIEF LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE As part of the Tripwire VIA platform, Tripwire Log Center offers out-of-the-box integration with Tripwire Enterprise to offer visibility

More information

How To Design A School Communication System

How To Design A School Communication System Integrated School Communications Curt Brautigan East Region Manager, Calypso Systems Seminar Agenda A bit about me (Who is this person talking and where is he from?) Changing dynamics / requirements in

More information

Security Center Unified Security Platform

Security Center Unified Security Platform Security Center Unified Security Platform License Plate Recognition Video Surveillance Access Control Innovative Solutions Simply Powerful. The Security Center is a unified security platform. It seamlessly

More information

Analytics. CathexisVision. CathexisVision Features. Video Management Solutions

Analytics. CathexisVision. CathexisVision Features. Video Management Solutions Analytics Features Video Management Solutions The Video Analytics Suite provides a powerful enhancement to the world-class, feature-rich Video Surveillance Management software, and significantly enriches

More information

Questions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements

Questions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements Questions? Assignment Why is proper project management important? What is goal of domain analysis? What is the difference between functional and non- functional requirements? Why is it important for requirements

More information

Die Mobiliar Insurance Company AG, Switzerland Adaptability and Agile Business Practices

Die Mobiliar Insurance Company AG, Switzerland Adaptability and Agile Business Practices Die Mobiliar Insurance Company AG, Switzerland Adaptability and Agile Business Practices Nominated by ISIS Papyrus Software 1. EXECUTIVE SUMMARY / ABSTRACT The Swiss insurance company Die Mobiliar is the

More information

Event-based middleware services

Event-based middleware services 3 Event-based middleware services The term event service has different definitions. In general, an event service connects producers of information and interested consumers. The service acquires events

More information

Modeling BPMN Diagrams within XTT2 Framework. A Critical Analysis**

Modeling BPMN Diagrams within XTT2 Framework. A Critical Analysis** AUTOMATYKA 2011 Tom 15 Zeszyt 2 Antoni Ligêza*, Tomasz Maœlanka*, Krzysztof Kluza*, Grzegorz Jacek Nalepa* Modeling BPMN Diagrams within XTT2 Framework. A Critical Analysis** 1. Introduction Design, analysis

More information

AXXONSOFT INTRODUCES VERSION OF AXXON INTELLECT ENTERPRISE PSIM

AXXONSOFT INTRODUCES VERSION OF AXXON INTELLECT ENTERPRISE PSIM AXXONSOFT INTRODUCES VERSION OF AXXON INTELLECT ENTERPRISE PSIM AxxonSoft has released version 4.9 of Axxon Intellect Enterprise PSIM. The version is focused on new capabilities and features that are taking

More information

Setting the Standard for Safe City Projects in the United States

Setting the Standard for Safe City Projects in the United States Leading Safe Cities Setting the Standard for Safe City Projects in the United States Edge360 is a provider of Safe City solutions to State & Local governments, helping our clients ensure they have a secure,

More information

Cloud Computing: Transformative Technology

Cloud Computing: Transformative Technology Cloud Computing: Physical and Cyber Security s Transformative Technology Cloud Computing: Evolution, not Conventional thinking Innovation Each organization maintains its own Kingdom of IT Keep an expensive

More information

An Automated Workflow System Geared Towards Consumer Goods and Services Companies

An Automated Workflow System Geared Towards Consumer Goods and Services Companies Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 An Automated Workflow System Geared Towards Consumer Goods and Services

More information

Usage of Business Process Choreography

Usage of Business Process Choreography Usage of Business Process Choreography Akira Tanaka, Hitachi, Ltd. tanakaak@soft.hitachi.co.jp Infrastructures and Standard 1 Agenda Introduction Lifecycle! Design phase! Usage phase! Managing phase Remarks

More information